Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe
Resource
win10v2004-20220901-en
General
-
Target
5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe
-
Size
312KB
-
MD5
6f714f49b64cc297da67de62245448c0
-
SHA1
78e505fc869e76690ad470689a72e4c1a91309eb
-
SHA256
5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507
-
SHA512
b24e1744368f346bd09774d66e5cfd113960d1f1c749cedfb0b02fdb3d1f14df61f804e132e683718493247d9ce1398ee635e34465ec147c2e9730d484626d52
-
SSDEEP
6144:I0L7L0aK5D5KyLyv9o3keQAGywpB3qSDVJtba7N9:I0L7L5KPFCo3JGTo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 igoq.exe -
Deletes itself 1 IoCs
pid Process 672 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Inyn\\igoq.exe" igoq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run igoq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe 2028 igoq.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2028 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 28 PID 1800 wrote to memory of 2028 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 28 PID 1800 wrote to memory of 2028 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 28 PID 1800 wrote to memory of 2028 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 28 PID 2028 wrote to memory of 1128 2028 igoq.exe 17 PID 2028 wrote to memory of 1128 2028 igoq.exe 17 PID 2028 wrote to memory of 1128 2028 igoq.exe 17 PID 2028 wrote to memory of 1128 2028 igoq.exe 17 PID 2028 wrote to memory of 1128 2028 igoq.exe 17 PID 2028 wrote to memory of 1224 2028 igoq.exe 16 PID 2028 wrote to memory of 1224 2028 igoq.exe 16 PID 2028 wrote to memory of 1224 2028 igoq.exe 16 PID 2028 wrote to memory of 1224 2028 igoq.exe 16 PID 2028 wrote to memory of 1224 2028 igoq.exe 16 PID 2028 wrote to memory of 1256 2028 igoq.exe 15 PID 2028 wrote to memory of 1256 2028 igoq.exe 15 PID 2028 wrote to memory of 1256 2028 igoq.exe 15 PID 2028 wrote to memory of 1256 2028 igoq.exe 15 PID 2028 wrote to memory of 1256 2028 igoq.exe 15 PID 2028 wrote to memory of 1800 2028 igoq.exe 12 PID 2028 wrote to memory of 1800 2028 igoq.exe 12 PID 2028 wrote to memory of 1800 2028 igoq.exe 12 PID 2028 wrote to memory of 1800 2028 igoq.exe 12 PID 2028 wrote to memory of 1800 2028 igoq.exe 12 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29 PID 1800 wrote to memory of 672 1800 5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe"C:\Users\Admin\AppData\Local\Temp\5c8be75b2fd5a6114fc85059acddcca2892d9f18704379aea9630b07223cd507.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\Inyn\igoq.exe"C:\Users\Admin\AppData\Roaming\Inyn\igoq.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbe49fa43.bat"2⤵
- Deletes itself
PID:672
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a13cbba2668032650ab2adeff42377e2
SHA1a69c18d27d1845f4b6011e4ba414bb83cc08eba6
SHA256412dacf4aba75f64b12bda7c96401455dc6bc3a030af14b6edcbe3b9ce1e1db2
SHA512793a8c22c45b95ba40c93fcab4924c1daad1b07c86e2292d2c146259c27694c07954278a092097b395b9dbd00e5fb40eb86cb18845f2bd141ef85c0b3690f4ee
-
Filesize
312KB
MD5f4c93f685cf9e1da2732f74b50c3b032
SHA11eed0a675b0602ca216903110ac3d59c3ea9d47d
SHA25602fce951e934716f03237be40e8d28ed47754e8f9d8d6ec129782654848fc863
SHA512ec641e7cc00bd5ad716de88ee65cb8b326057b26fc2c2508d4d218b4e7df3aaa5f082217a26880fcfb5cee3ea288dbfce2a1902ef67ad7bd31ad208784ccd055
-
Filesize
312KB
MD5f4c93f685cf9e1da2732f74b50c3b032
SHA11eed0a675b0602ca216903110ac3d59c3ea9d47d
SHA25602fce951e934716f03237be40e8d28ed47754e8f9d8d6ec129782654848fc863
SHA512ec641e7cc00bd5ad716de88ee65cb8b326057b26fc2c2508d4d218b4e7df3aaa5f082217a26880fcfb5cee3ea288dbfce2a1902ef67ad7bd31ad208784ccd055
-
Filesize
312KB
MD5f4c93f685cf9e1da2732f74b50c3b032
SHA11eed0a675b0602ca216903110ac3d59c3ea9d47d
SHA25602fce951e934716f03237be40e8d28ed47754e8f9d8d6ec129782654848fc863
SHA512ec641e7cc00bd5ad716de88ee65cb8b326057b26fc2c2508d4d218b4e7df3aaa5f082217a26880fcfb5cee3ea288dbfce2a1902ef67ad7bd31ad208784ccd055
-
Filesize
312KB
MD5f4c93f685cf9e1da2732f74b50c3b032
SHA11eed0a675b0602ca216903110ac3d59c3ea9d47d
SHA25602fce951e934716f03237be40e8d28ed47754e8f9d8d6ec129782654848fc863
SHA512ec641e7cc00bd5ad716de88ee65cb8b326057b26fc2c2508d4d218b4e7df3aaa5f082217a26880fcfb5cee3ea288dbfce2a1902ef67ad7bd31ad208784ccd055